[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20031011004634.GA10719@arobas.net>
From: vladimir at arobas.net (Vladimir Parkhaev)
Subject: Re: Bad news on RPC DCOM vulnerability
Quoting Brown, Bobby (US - Hermitage) (bobbrown@...oitte.com):
> For us that can not interpret the site, what more information can be
> provided.
>
Funny enough, it is a russian translatiion of the original message you
replying to:
> ----- Original Message -----
> From: "3APA3A" <3APA3A@...URITY.NNOV.RU>
> To: <bugtraq@...urityfocus.com>; <full-disclosure@...ts.netsys.com>;
> <NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM>
> Cc: <Secure@...rosoft.com>
> Sent: Friday, October 10, 2003 6:48 PM
> Subject: Bad news on RPC DCOM vulnerability
>
>
> > Dear bugtraq@...urityfocus.com,
> >
> > There are few bad news on RPC DCOM vulnerability:
> >
> > 1. Universal exploit for MS03-039 exists in-the-wild, PINK FLOYD is
> > again actual.
> > 2. It was reported by exploit author (and confirmed), Windows XP SP1
> > with all security fixes installed still vulnerable to variant of the
> > same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
> > exists, but code execution is probably possible. Technical details are
> > sent to Microsoft, waiting for confirmation.
> >
> > Dear ISPs. Please instruct you customers to use personal fireWALL in
> > Windows XP.
> >
> > --
> > http://www.security.nnov.ru
> > /\_/\
> > { , . } |\
> > +--oQQo->{ ^ }<-----+ \
> > | ZARAZA U 3APA3A }
> > +-------------o66o--+ /
> > |/
> > You know my name - look up my number (The Beatles)
> >
> >
> >
>
>
Powered by blists - more mailing lists